Skip to content

fix(deps): vuln minor upgrades — 9 packages (minor: 6 · patch: 3) [src/product-management-service]#645

Closed
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit into
mainfrom
engraver-auto-version-upgrade/minorpatch/go/product-management-service/0-1776936529
Closed

fix(deps): vuln minor upgrades — 9 packages (minor: 6 · patch: 3) [src/product-management-service]#645
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit into
mainfrom
engraver-auto-version-upgrade/minorpatch/go/product-management-service/0-1776936529

Conversation

@gh-worker-campaigns-3e9aa4
Copy link
Copy Markdown
Contributor

Summary: Critical-severity security update — 15 packages upgraded (MINOR changes included)

Manifests changed:

  • src/product-management-service (go)

✅ Action Required: Please review the changes below. If they look good, approve and merge this PR.


Updates

Package From To Type Dep Type Vulnerabilities Fixed
github.com/jackc/pgx/v5 v5.6.0 v5.9.2 minor Transitive 4 CRITICAL, 1 LOW
github.com/jackc/pgx/v5 v5.7.4 v5.9.2 minor Direct 4 CRITICAL, 1 LOW
github.com/gofiber/fiber/v2 v2.52.5 v2.52.12 patch Transitive 3 CRITICAL, 3 HIGH, 1 MODERATE, 2 MEDIUM
google.golang.org/grpc v1.70.0 v1.80.0 minor Transitive 3 CRITICAL
google.golang.org/grpc v1.70.0 v1.80.0 minor Transitive 3 CRITICAL
google.golang.org/grpc v1.70.0 v1.80.0 minor Transitive 3 CRITICAL
google.golang.org/grpc v1.70.0 v1.80.0 minor Transitive 3 CRITICAL
google.golang.org/grpc v1.70.0 v1.80.0 minor Transitive 3 CRITICAL
google.golang.org/grpc v1.64.1 v1.80.0 minor Transitive 3 CRITICAL
github.com/go-jose/go-jose/v3 v3.0.3 v3.0.5 patch Transitive 1 HIGH, 1 MODERATE, 2 MEDIUM
github.com/aws/aws-sdk-go v1.44.327 v1.55.8 minor Transitive 2 MODERATE, 2 LOW
github.com/go-chi/chi/v5 v5.0.10 v5.2.5 minor Transitive 2 MODERATE
github.com/go-chi/chi v1.5.4 v1.5.5 patch Transitive 2 MODERATE
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.4.13 v1.7.9 minor Transitive 1 MODERATE
github.com/aws/aws-sdk-go-v2/service/s3 v1.32.0 v1.99.1 minor Transitive 1 MODERATE

Security Details

🚨 Critical & High Severity (33 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
github.com/gofiber/fiber/v2 CVE-2025-66630 critical Fiber insecurely fallsback in utils.UUIDv4() / utils.UUID() — predictable / zero‑UUID on crypto/rand failure v2.52.5 -
github.com/gofiber/fiber/v2 GO-2026-4471 critical Fiber has an insecure fallback in utils.UUIDv4() / utils.UUID() on crypto/rand failure in github.com/gofiber/fiber v2.52.5 2.52.11
github.com/gofiber/fiber/v2 GHSA-68rr-p4fp-j59v CRITICAL Fiber has an insecure fallback in utils.UUIDv4() / utils.UUID() — predictable / zero‑UUID on crypto/rand failure v2.52.5 2.52.11
github.com/jackc/pgx/v5 GHSA-9jj7-4m8r-rfcm CRITICAL Memory-safety vulnerability in github.com/jackc/pgx/v5. v5.6.0 5.9.0
github.com/jackc/pgx/v5 GO-2026-4772 CRITICAL CVE-2026-33816 in github.com/jackc/pgx v5.6.0 5.9.0
github.com/jackc/pgx/v5 GO-2026-4771 CRITICAL CVE-2026-33815 in github.com/jackc/pgx v5.6.0 5.9.0
github.com/jackc/pgx/v5 GHSA-xgrm-4fwx-7qm8 CRITICAL pgx contains memory-safety vulnerability v5.6.0 -
github.com/jackc/pgx/v5 GO-2026-4772 CRITICAL CVE-2026-33816 in github.com/jackc/pgx v5.7.4 5.9.0
github.com/jackc/pgx/v5 GHSA-9jj7-4m8r-rfcm CRITICAL Memory-safety vulnerability in github.com/jackc/pgx/v5. v5.7.4 5.9.0
github.com/jackc/pgx/v5 GO-2026-4771 CRITICAL CVE-2026-33815 in github.com/jackc/pgx v5.7.4 5.9.0
github.com/jackc/pgx/v5 GHSA-xgrm-4fwx-7qm8 CRITICAL pgx contains memory-safety vulnerability v5.7.4 -
google.golang.org/grpc GHSA-p77j-4mvh-x3m3 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 1.79.3
google.golang.org/grpc CVE-2026-33186 critical gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 -
google.golang.org/grpc GO-2026-4762 critical Authorization bypass in gRPC-Go via missing leading slash in :path in google.golang.org/grpc v1.70.0 1.79.3
google.golang.org/grpc GO-2026-4762 critical Authorization bypass in gRPC-Go via missing leading slash in :path in google.golang.org/grpc v1.70.0 1.79.3
google.golang.org/grpc CVE-2026-33186 critical gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 -
google.golang.org/grpc GHSA-p77j-4mvh-x3m3 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 1.79.3
google.golang.org/grpc CVE-2026-33186 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.64.1 -
google.golang.org/grpc GO-2026-4762 CRITICAL Authorization bypass in gRPC-Go via missing leading slash in :path in google.golang.org/grpc v1.64.1 1.79.3
google.golang.org/grpc GHSA-p77j-4mvh-x3m3 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.64.1 1.79.3
google.golang.org/grpc GHSA-p77j-4mvh-x3m3 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 1.79.3
google.golang.org/grpc CVE-2026-33186 critical gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 -
google.golang.org/grpc GO-2026-4762 critical Authorization bypass in gRPC-Go via missing leading slash in :path in google.golang.org/grpc v1.70.0 1.79.3
google.golang.org/grpc CVE-2026-33186 critical gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 -
google.golang.org/grpc GO-2026-4762 critical Authorization bypass in gRPC-Go via missing leading slash in :path in google.golang.org/grpc v1.70.0 1.79.3
google.golang.org/grpc GHSA-p77j-4mvh-x3m3 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 1.79.3
google.golang.org/grpc GHSA-p77j-4mvh-x3m3 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 1.79.3
google.golang.org/grpc CVE-2026-33186 critical gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 -
google.golang.org/grpc GO-2026-4762 critical Authorization bypass in gRPC-Go via missing leading slash in :path in google.golang.org/grpc v1.70.0 1.79.3
github.com/go-jose/go-jose/v3 GHSA-78h2-9frx-2jm8 HIGH Go JOSE Panics in JWE decryption v3.0.3 3.0.5
github.com/gofiber/fiber/v2 GHSA-qx2q-88mx-vhg7 HIGH Fiber Crashes in BodyParser Due to Unvalidated Large Slice Index in Decoder v2.52.5 2.52.9
github.com/gofiber/fiber/v2 GO-2025-3845 HIGH Fiber Crashes in BodyParser Due to Unvalidated Large Slice Index in Decoder in github.com/gofiber/fiber v2.52.5 2.52.9
github.com/gofiber/fiber/v2 CVE-2025-54801 HIGH Fiber Susceptible to Crash via BodyParser Due to Unvalidated Large Slice Index in Decoder v2.52.5 -
ℹ️ Other Vulnerabilities (18)
Package CVE Severity Summary Unsafe Version Fixed In
github.com/go-jose/go-jose/v3 CVE-2025-27144 medium Go JOSE's Parsing Vulnerable to Denial of Service v3.0.3 -
github.com/go-jose/go-jose/v3 GO-2025-3485 medium DoS in go-jose Parsing in github.com/go-jose/go-jose v3.0.3 3.0.4
github.com/gofiber/fiber/v2 CVE-2026-25882 medium Fiber has a Denial of Service Vulnerability via Route Parameter Overflow v2.52.5 -
github.com/gofiber/fiber/v2 GO-2026-4543 medium Fiber has a Denial of Service Vulnerability via Route Parameter Overflow in github.com/gofiber/fiber v2.52.5 2.52.12
github.com/aws/aws-sdk-go GO-2022-0646 MODERATE CBC padding oracle issue in AWS S3 Crypto SDK for golang in github.com/aws/aws-sdk-go v1.44.327 -
github.com/aws/aws-sdk-go GHSA-f5pg-7wfw-84q9 MODERATE CBC padding oracle issue in AWS S3 Crypto SDK for golang v1.44.327 1.34.0
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream GHSA-xmrv-pmrh-hhx2 MODERATE Denial of Service due to Panic in AWS SDK for Go v2 SDK EventStream Decoder v1.4.13 1.7.8
github.com/aws/aws-sdk-go-v2/service/s3 GHSA-xmrv-pmrh-hhx2 MODERATE Denial of Service due to Panic in AWS SDK for Go v2 SDK EventStream Decoder v1.32.0 1.97.3
github.com/go-chi/chi GO-2026-4316 MODERATE Open redirect vulnerability in the RedirectSlashes middleware in github.com/go-chi/chi v1.5.4 -
github.com/go-chi/chi GHSA-mqqf-5wvp-8fh8 MODERATE chi has an open redirect vulnerability in the RedirectSlashes middleware v1.5.4 5.2.4
github.com/go-chi/chi/v5 GHSA-vrw8-fxc6-2r93 MODERATE chi Allows Host Header Injection which Leads to Open Redirect in RedirectSlashes v5.0.10 5.2.2
github.com/go-chi/chi/v5 GO-2025-3770 MODERATE Host header injection which leads to open redirect in RedirectSlashes in github.com/go-chi/chi v5.0.10 5.2.2
github.com/go-jose/go-jose/v3 GHSA-c6gw-w398-hv78 MODERATE DoS in go-jose Parsing v3.0.3 3.0.4
github.com/gofiber/fiber/v2 GHSA-mrq8-rjmw-wpq3 MODERATE Fiber has a Denial of Service Vulnerability via Route Parameter Overflow v2.52.5 2.52.12
github.com/aws/aws-sdk-go GO-2022-0635 LOW In-band key negotiation issue in AWS S3 Crypto SDK for golang in github.com/aws/aws-sdk-go v1.44.327 -
github.com/aws/aws-sdk-go GHSA-7f33-f4f5-xwgw LOW In-band key negotiation issue in AWS S3 Crypto SDK for golang v1.44.327 1.34.0
github.com/jackc/pgx/v5 GHSA-j88v-2chj-qfwx LOW pgx: SQL Injection via placeholder confusion with dollar quoted string literals v5.6.0 5.9.2
github.com/jackc/pgx/v5 GHSA-j88v-2chj-qfwx LOW pgx: SQL Injection via placeholder confusion with dollar quoted string literals v5.7.4 5.9.2
⚠️ Dependencies that have Reached EOL (2)
Dependency Unsafe Version EOL Date New Version Path
github.com/aws/aws-sdk-go-v2/service/s3 v1.32.0 Apr 19, 2026 v1.99.1 src/product-management-service/src/core/go.mod
github.com/go-chi/chi v1.5.4 - v1.5.5 src/product-management-service/src/core/go.mod

Review Checklist

Standard review:

  • Review changes for compatibility with your code
  • Check for breaking changes in release notes
  • Run tests locally or wait for CI
  • Approve and merge this PR

Update Mode: Vulnerability Remediation (Critical/High)

🤖 Generated by DataDog Automated Dependency Management System

@campaigner-prod
Copy link
Copy Markdown
Contributor

Release Notes

github.com/jackc/pgx/v5 (v5.6.0 → v5.9.2) — Changelog

Fix SQL Injection via placeholder confusion with dollar quoted string literals (GHSA-j88v-2chj-qfwx)

SQL injection can occur when:

  1. The non-default simple protocol is used.
  2. A dollar quoted string literal is used in the SQL query.
  3. That query contains text that would be would be interpreted outside as a placeholder outside of a string literal.
  4. The value of that placeholder is controllable by the attacker.

e.g.

attackValue := `$tag$; drop table canary; --`
_, err = tx.Exec(ctx, `select $tag$ $1 $tag$, $1`, pgx.QueryExecModeSimpleProtocol, attackValue)

This is unlikely to occur outside of a contrived scenario.

github.com/gofiber/fiber/v2 (v2.52.5 → v2.52.12) — GitHub Release

v2.52.12

🐛 Fixes

Full Changelog: gofiber/fiber@v2.52.11...v2.52.12

v2.52.11

What's Changed

🧹 Updates

🐛 Bug Fixes

Full Changelog: gofiber/fiber@v2.52.10...v2.52.11

v2.52.10

🐛 Bug Fixes

📚 Documentation

New Contributors

Full Changelog: gofiber/fiber@v2.52.9...v2.52.10

v2.52.9

🐛 Bug Fixes

Full Changelog: gofiber/fiber@v2.52.8...v2.52.9

v2.52.8

👮 Security

🧹 Updates

🐛 Bug Fixes

📚 Documentation

Full Changelog: gofiber/fiber@v2.52.6...v2.52.8

v2.52.6

🐛 Bug Fixes

📚 Documentation

🛠️ Maintenance

Full Changelog: gofiber/fiber@v2.52.5...v2.52.6

google.golang.org/grpc (v1.70.0 → v1.80.0) — GitHub Release

v1.80.0

Behavior Changes

Bug Fixes

New Features

Performance Improvements

(truncated)

v1.79.3

Security

v1.79.2

Bug Fixes

v1.79.1

Bug Fixes

v1.79.0

API Changes

Behavior Changes

New Features

Bug Fixes

(truncated)

v1.78.0

Behavior Changes

New Features

(truncated — see source for full notes)

github.com/go-jose/go-jose/v3 (v3.0.3 → v3.0.5) — GitHub Release

v3.0.5

What's Changed

Fixes GHSA-78h2-9frx-2jm8

We recommend migrating from v3 to v4, and we will stop support v3 in the near future.

Full Changelog: go-jose/go-jose@v3.0.4...v3.0.5

v3.0.4

What's Changed

Backport fix for GHSA-c6gw-w398-hv78 CVE-2025-27144
go-jose/go-jose#174

Full Changelog: go-jose/go-jose@v3.0.3...v3.0.4

github.com/go-chi/chi/v5 (v5.0.10 → v5.2.5) — GitHub Release

v5.2.5

What's Changed

New Contributors

Full Changelog: go-chi/chi@v5.2.3...v5.2.5

v5.2.3

What's Changed

New Contributors

Full Changelog: go-chi/chi@v5.2.2...v5.2.3

v5.2.2

What's Changed

Security fix

  • Fixes GHSA-vrw8-fxc6-2r93 - "Host Header Injection Leads to Open Redirect in RedirectSlashes" commit
    • a lower-severity Open Redirect that can't be exploited in browser or email client, as it requires manipulation of a Host header
    • reported by Anuraag Baishya, @anuraagbaishya. Thank you!

New Contributors

(truncated)

v5.2.1

⚠️ Chi supports Go 1.20+

Starting this release, we will now support the four most recent major versions of Go. See go-chi/chi#963 for related discussion.

What's Changed

Full Changelog: go-chi/chi@v5.2.0...v5.2.1

v5.2.0

What's Changed

(truncated — see source for full notes)

github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream (v1.4.13 → v1.7.9) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md

github.com/aws/aws-sdk-go-v2/service/s3 (v1.32.0 → v1.99.1) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md


Generated by ADMS Sources: 4 GitHub Releases, 3 Changelogs, 2 not available.

@seberm-6
Copy link
Copy Markdown

Hey, sorry for the noise. This was caused by a bug in our automated dependency update system that incorrectly included upstream changelog content in PR comments, triggering notifications to external contributors. The feature flag has been turned off and we're working on a fix. Sorry about that again.

@campaigner-prod campaigner-prod Bot closed this Apr 23, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant